Title: Identifying phishing attacks in communication networks using URL consistency features

Authors: Nureni Ayofe Azeez; Balikis Bolanle Salaudeen; Sanjay Misra; Robertas Damaševičius; Rytis Maskeliūnas

Addresses: Department of Computer Sciences, University of Lagos, Lagos, Nigeria ' Department of Computer Sciences, University of Lagos, Lagos, Nigeria ' Department of Electrical and Information Engineering, Covenant University, Ota, Nigeria; Department of Computer Engineering, Atilim University, Ankara, Turkey ' Faculty of Informatics, Kaunas University of Technology, Kaunas, Lithuania ' Faculty of Informatics, Kaunas University of Technology, Kaunas, Lithuania

Abstract: Phishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks.

Keywords: phishing attacks; risk assessment; cybersecurity; digital forensics; digital evidence.

DOI: 10.1504/IJESDF.2020.106318

International Journal of Electronic Security and Digital Forensics, 2020 Vol.12 No.2, pp.200 - 213

Received: 29 Jan 2019
Accepted: 20 Mar 2019

Published online: 02 Apr 2020 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article